Cyber-security experts have just discovered a new modular downloader that has the capability to download other modules and payloads. It’s embedded itself in large phishing campaigns and primarily hitting major financial institutions, planting their seeds for possible future attacks. Named Marap by security researchers, after its command and control (C&C) phone home parameter “param” spelled...Continue Reading
Cyber-security researchers are warning owners of Joomla and WordPress websites of a malicious redirect script that is pushing visitors to malicious websites and expose them to various malwares. A renowned cyber-security researcher published a report outlining a rogue hypertext access (.htaccess) injector found on a client website. He reported that the impacted site was directing...Continue Reading
BlackRouter, a ransomware recognized in 2018 is currently being endorsed as a Raas by its maker. The individual behind BlackRouter, known as “MOH3NE2”, is accepted to be of Iranian origins. This ransomware was identified by a cybersecurity scientist Petrovic and is found to have enhanced highlights, for example, a clock and an alternate GUI over...Continue Reading
The overall number of social media impersonation increased 11-fold from December 2016 to December 2018, with the bad actors bent on collecting credentials and PII. Impersonators are most commonly found on Facebook, Twitter, Google+, though impersonators were also found on Instagram, YouTube and LinkedIn. Nearly half of all nefarious social media impersonators disguise their payload...Continue Reading
Cyber security researchers have just discovered a new malware, called “Linux Rabbit,” that targeted Linux servers and Internet-of-Things (IoT) devices in a campaign that began in August 2018 and continued until October 2018. The campaign targeted devices in Russia, South Korea, the UK, and the US. The campaign utilizes two strains of malware that share...Continue Reading
Security Researchers recently discovered a new malware trojan called GolfSpythat targets android phone users in the Middle East and was designed to steal personal information and potentially take control over mobile devices.The malware’s cyberespionage campaign was named “Bouncing Golf”based on the malware’s code in the package named “golf.”This info-stealing malware is known for its wide...Continue Reading
With each passing day, cases of WordPress infection that redirects visitors to suspicious pages is getting common. Recently, a vulnerability was discovered in tag Div Themes and Ultimate Member Plugins. In this WordPress redirect hack visitors to your website are redirected to phishing or malicious pages. In this hack, users, when redirected, are taken...Continue Reading
Cybercriminals behind the notorious Dridex and Locky ransomware have a new target in their sights – large retail, restaurant and grocery chains located in the US. Researchers are warning the well-known financial criminal group TA505 is behind a new wave of email campaigns distributing personalized malware-laced attachments, a technique not previously associated with the...Continue Reading
Hackers have deployed a botnet that’s actively targeting systems running a remote desktop protocol (RDP) connection using a hard-to-detect brute-forcing mechanism. A security researcher has discovered that more than 1.5 million RDP endpoints have so far been compromised by a botnet dubbed GoldBrute and that this figure is only expected to rise. It...Continue Reading
In this day and age, digital aggressors are consistently gaining ground in their hacking apparatuses and systems so as to accomplish a greater vindictive plan. Be that as it may, this does not mean they are for saking the essential instruments, methods, and systems when leading a digital assault. Indeed, a large portion of...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.